Nothing Special   »   [go: up one dir, main page]

US20080243920A1 - Communication Reputation - Google Patents

Communication Reputation Download PDF

Info

Publication number
US20080243920A1
US20080243920A1 US11/692,865 US69286507A US2008243920A1 US 20080243920 A1 US20080243920 A1 US 20080243920A1 US 69286507 A US69286507 A US 69286507A US 2008243920 A1 US2008243920 A1 US 2008243920A1
Authority
US
United States
Prior art keywords
reputation
communication
reputation data
request
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US11/692,865
Other versions
US7895154B2 (en
Inventor
Ben Newman
Jose M De Oliveira
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsoft Technology Licensing LLC
Original Assignee
Microsoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Corp filed Critical Microsoft Corp
Priority to US11/692,865 priority Critical patent/US7895154B2/en
Assigned to MICROSOFT CORPORATION reassignment MICROSOFT CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: DE OLIVEIRA, JOSE M, NEWMAN, BEN
Publication of US20080243920A1 publication Critical patent/US20080243920A1/en
Application granted granted Critical
Publication of US7895154B2 publication Critical patent/US7895154B2/en
Assigned to MICROSOFT TECHNOLOGY LICENSING, LLC reassignment MICROSOFT TECHNOLOGY LICENSING, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MICROSOFT CORPORATION
Expired - Fee Related legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/107Computer-aided management of electronic mailing [e-mailing]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/212Monitoring or handling of messages using filtering or selective blocking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/436Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/663Preventing unauthorised calls to a telephone set
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42136Administration or customisation of services
    • H04M3/42153Administration or customisation of services by subscriber
    • H04M3/42161Administration or customisation of services by subscriber via computer interface

Definitions

  • Telephony and text messaging is becoming increasingly widespread.
  • mobile communication devices allow users to remain in near continual communication throughout his/her daily life.
  • Many devices such as mobile telephone communication devices, may additionally permit textual communication, such as “text messaging” (TM) or “instant messaging” (IM), which may further ease user communication.
  • TM text messaging
  • IM instant messaging
  • certain types of communications such as, sales calls; text messages for goods or services; adult content; calls or messages which are of a dubious nature (i.e., known or suspected scams) or may result in a fee (a “900” number or a fee based IM).
  • a user may be hesitant to communicate with an unknown party.
  • a prime example of this problem is a telephone call which is received during dinnertime. Even if the user subscribes to “caller id,” which provides the user with the telephone number associated with the communication, this information may be of limited use in deciding whether to “pickup” or complete the call. Additionally, persons attempting to defraud a user may implement a variety of techniques to avoid revealing his/her identity. A party attempting to implement a telephone scam may use numerous telephone numbers and aliases to minimize detection.
  • a user may be hesitant to communicate with an inbound call or other communication because he/she is not sure if the other party is legitimate. For instance, a caller may ask to call back a credit card company, at the phone number provided on the credit card, rather than risk divulging information to a party establishing an inbound communication.
  • Outbound communications are also subject to similar problems. Some users may avoid contacting legitimate businesses/institutions in an attempt to avoid being defrauded. The foregoing situation may be exemplified by senior citizens and other portions of the population which are increasingly the targets of fraudulent communications. For instance, a 3 rd party may attempt to establish a “phony” toll-free number to lure unsuspecting users into divulging financial or personal information which is subsequently used in a fraudulent manner. Other forms of communication, such as mail solicitation, television commercials, may be implemented in order to direct users to contact these phony numbers.
  • a request to establish a communication link may include searching a database of reputation data for information regarding at least one of the source's or the intended receiver's reputation data.
  • FIG. 1 illustrates an environment in an exemplary implementation that may use technologies to provide communication reputation data.
  • FIG. 2 is a flow diagram depicting a procedure in an exemplary implementation in which reputation data is provided to a source or an intended receiver.
  • FIG. 3 is a flow diagram depicting a procedure in an exemplary implementation in which reputation data is implemented to block communication or present reputation data.
  • a communication end point may be a communication source or a communication intended receiver/receiver.
  • the techniques described herein may be applicable to inbound and outbound directed communications. While telephonic (voice “land line”) communication is primarily discussed, the techniques, software/hardware and system are additionally applicable to mobile telephone communication (including cellular telephone communication), instant messaging, text messaging, voice messaging, and facsimile communication. Examples of telephone communication may include land lines, cellular communications, as well as, voice over internet protocol communications (VoIP).
  • VoIP voice over internet protocol communications
  • reputation data is provided to a source and/or an intended receiver as part of a request to complete a communication link.
  • a database is searched to obtain reputation data associated with one of the end points to the intended communication. For example, at least a portion of a caller's reputation may be presented to the intended recipient as a visual display or audible cue, so that the recipient may better understand the caller's (end point) reputation.
  • exemplary environments are first described that are operable to provide communication end point reputation to another communication endpoint.
  • the reputation of a call's source is provided to an intended receiver.
  • a communication source may be provided with reputation data associated with the intended receiver.
  • an audible message may be presented to warn the caller that the intended recipient has a “suspicious” reputation.
  • the provided communication end point reputation may be used to block a requested communication, or may be presented to another end point, and so on.
  • FIG. 1 illustrates an environment 100 in an exemplary implementation that is operable to employ a reputation classification system 102 .
  • An assignment module 106 may be included in the reputation classification system 102 . As illustrated, the reputation classification system 102 is resident on a computing device 104 which is remote from the communication request. The assignment module 106 may accept user feedback information and usage information to generate reputation data associated with a communication end point.
  • the assignment module 106 may be configured to collect data and assign reputation and classification to a communication end point. For instance, after a predetermined number of short duration phone calls and reports from clients, indicating the conversation was “financial” in nature and “suspicious,” the assignment module 106 assigns the communication source a “solicitor” classification. This assignment may be based on usage, reported reputation or a combination thereof. The source also may be assigned a “suspicious” reputation.
  • Assigned reputation data including the end point classification, may be stored in a database 108 .
  • the assignment module 106 may forward additional reputation data to the database 108 for storage.
  • the assignment module 106 may send reputation data regarding how the classification and reputation determination was made. Examples may include an agency reporting the end point, a “large” group of users (in comparison to other end point reputation data stored in the database 108 ) reporting similar reputation information and classification information, a “small” group (in comparison to other reputation data stored in the database 108 ) reporting an “egregious” reputation information and an “offensive” classification information, and so on.
  • the database may be arranged in a hierarchical configuration to promote efficient searching. For example, a database for telephone communication end points may be arranged according to “area code” and “prefix.”
  • reputation data may include date stamps, an identity (such as a phone number), how many users are associated with an identifier (such as a telephone number), communication history, reputation data to aid data analysis, evidence to support an assigned reputation, and so on.
  • the assignment module 106 may integrate user feedback information and usage information to maintain reputation data for the communication request source or intended receiver/receiver.
  • reputation data includes a scaled value for a reputation and a classification.
  • a reputation scale may range from “good” or “trustworthy” to “suspicious” to “bad.”
  • the different reputation descriptors may be associated with numerical ranges. For instance, a “bad” input may be assigned a higher scale value than a “suspicious” ranking.
  • Implementing a scale may permit weighting feedback and other analysis. For example, “bad” reputation feedback may be weighted more than a “good” reputation feedback.
  • Classifications may include, but are not limited to, solicitations, pay services, adult content, and so on. Multiple classifications may be applied. For example, an adult end point having a fee component, may be assigned an “adult” and a “fee service” classification. The classifications may be scaled as well.
  • the assignment module 106 may assign additional or different factors as part of the reputation data for use with an end point associated with a minor.
  • the reputation classification system 102 as described herein may permit “parental control” thorough use of assigned reputation data.
  • the assignment module 106 may obtain feedback information from an interface module 110 associated with a communication end point. For example, at the end of a telephone conversation, the receiver may input reputation feedback information associated with the source of the call. For instance, a user may input data via a web page using a check box, an adjustable indicator, and so on.
  • the interface module 110 is accessed as a web page on which the user may input data associated with the communication. For example, a user may interact with the interface module 110 to classify a communication requesting a donation as a “financial solicitation.” Further, the user may assign a “suspicious” reputation to the source end point.
  • the interface module 10 is included in a communication device. For example, a user may navigate a screen included on a land line phone 114 to input reputation data. For text messages, a user may submit a text message, to the interface module 110 , regarding the reputation of the party sending an original text message. For devices with limited functionality (for data to be entered), the interface module 110 may accommodate telephone inputs. For instance, a user may call an established toll free number to input reputation data.
  • the interface module 110 may request a password to access data, report a reputation or access other features. This may permit a parent to exercise control over a common communication device or tailor a communication device specifically for a minor.
  • the reputation classification system 102 may include a service module 116 .
  • the service module 116 may forward usage information to the assignment module 106 .
  • a usage pattern is forwarded to the assignment module 106 for incorporation into reputation data.
  • the service module 116 may identify an end, point making numerous short duration phone calls, to the assignment module 106 .
  • Usage information may include, but is not limited to, identifying an end point which routinely communicates with particular segments of the population. For example, social engineering “campaigns” may contact numerous devices associated with users belonging to a particular group. Common targets may include senior citizens, people who contributed to organizations, people residing in particular areas, and so on.
  • reputation data may be integrated from other communication formats.
  • reputation data derived from other communications mediums may be incorporated into reputation data for the relevant medium.
  • a user may report a telephone number associated with a physical mail solicitation to the interface module 110 for consideration in determining a telephone reputation.
  • the service module 116 may block a telephone communication from a telephone number associated with an email “SPAM” campaign.
  • a communication end point which is related to a well characterized communication end point (such as a highly trafficked corporate web site) in another communication format may be assigned a reputation and classification based at least partially on the reputation data characteristics for the other communication medium. For example, a telephone number associated with a highly trafficked corporate or government web site is assigned a “verified” telephone reputation based on the communication characteristics associated with the Web traffic.
  • the service module 116 blocks or presents reputation data based on learned user preferences.
  • the service module 116 may block the communication if one or more criteria are met. Criteria may include a portion of the reputation data stored in the database 108 .
  • the service module 116 may block communications from an end point having with a “fee” classification. Blocking may be achieved by the communication device querying the service module 116 via a simple object access protocol (SOAP).
  • SOAP simple object access protocol
  • the communication device may access the service module 116 by a SOAP request.
  • the service module 116 may allow passive blocking of communication requests based on learned user preferences. For example, the service module 116 may block communications having reputation characteristic(s) similar to those the user has previously blocked, reported unfavorable reputation data, ended the communication quickly, and so on. The service module 116 may apply a heuristic determination of previous user inputs and usage to determine whether to permit the call or present reputation data.
  • the service module 116 provides at least a portion of the reputation data based on the assigned reputation, if a user has previously requested reputation data for “questionable” end points.
  • the service module 116 may block a communication from a “bad” end point, if the user has previously blocked calls from other “bad” end points.
  • the service module 116 may present an audible warning of the end point's reputation data.
  • the service module 116 may adaptively learn which communication requests to block, or present data for, as a result of user preference changes. For example, if a user repeatedly blocks a “questionable” end point the service module 116 may block similar end points. Further, if a user has several outbound communications with “questionable” end points the service module 116 may raise the threshold for incoming calls. The user may configure the interface module 110 to override the service module 116 as desired.
  • the user may override the passive blocking by applying user selected rules.
  • a user may turn off passive blocking, rather than risk blocking a desired communication.
  • the user may interact with the service module 116 by adjusting the level at which passive blocking is applied. The user may do this by accessing the service module 116 through the interface module 110 .
  • the service module 116 may include an address book of acceptable communication end points.
  • the address book may be maintained in the database 108 as well.
  • the service module 116 may search the address book prior to searching reputation data.
  • the service module may include a list of acceptable communication sources, for the intended receiver, so that a communication from a family member is passed through without searching for the source's reputation.
  • the system components and the communication devices may communicate via a network 118 or multiple networks.
  • the network 118 is the “Internet,” or the “World Wide Web,” while the communication request and subsequent communication occur over a separate land line network.
  • VoIP Voice over Internet Protocol telephone communication
  • the Internet may be utilized for both the voice communication and communications for the reputation classification system components.
  • a cellular network may be included. For example, communication requests may be passed over a wireless cellular link, while communications between the smart phone and the reputation classification system 102 occur over the cellular network and the Internet.
  • the network may include a wide area network (WAN), a local area network (LAN), a wireless network, a public telephone network, an intranet, and so on.
  • WAN wide area network
  • LAN local area network
  • wireless network a public telephone network
  • intranet an intranet
  • the network may be configured to include multiple sub-networks or multiple different networks.
  • a reputation classification system may be partially maintained on a device functioning as a communication end point.
  • the user module and the interface module 110 may be included on a smart phone to interact with a database 108 maintained by a computing device 104 .
  • the interface module 122 may reside on an end point device (such as the smart phone 120 ), while the assignment module 124 and the service module 126 and database 128 reside on private branch exchange hardware 130 .
  • any of the functions described herein can be implemented using software, firmware, hardware (e.g., fixed logic circuitry), manual processing, or a combination of these implementations.
  • the terms “module,” “functionality,” and “logic” as used herein generally represent software, firmware, hardware, or a combination thereof.
  • the module, functionality, or logic represents program code that performs specified tasks when executed on a processor (e.g., CPU or CPUs).
  • the program code can be stored in one or more computer readable memory devices, e.g., memory.
  • FIG. 2 discloses an exemplary procedure of reputation communication filtering.
  • the procedure may include requesting 202 establishment of a communication link between a source and an intended receiver/receiver.
  • Examples of communication link requests include placing a telephone call or facsimile by dialing a telephone number, transmitting a text message, and so on.
  • the communication link request may be issued over a dedicated network. For instance, an incoming communication request may be issued over a land line network.
  • a database including reputation data may be searched 204 for reputation data associated with the source of the communication, the intended receiver or combinations thereof.
  • the procedure may include searching a database of reputation data associated with a physical device used in the communication request.
  • Reputation data may include at least a reputation and a classification for a source, an intended receiver/receiver.
  • a list or address book of acceptable communication sources/intended receiver may be checked 206 so that the communication link is connected without having to search for reputation data.
  • the procedure may include searching the user's “acceptable” address book prior to searching for reputation data. If an end point is included in the address book the communication may be permitted without searching the database. Thus, database searching may be avoided for communication end points occurring in the address book. Personalized information associated with the communication end point in the address book may be provided.
  • Searching may be initiated by forwarding the search request from the communication device to a remote server.
  • a facsimile machine forwards a search request to a remote computer prior to connecting the facsimile call.
  • the fax may implement a SOAP communication with a remote server which searches the database. This search request may be made over a separate network than the network on which the communication request was received.
  • the communication request is intercepted by intermediate device which requests a search prior to completing the communication link with the intended device.
  • intermediate device For example, a PBX exchange device searches a database including reputation data before the call is completed to the intended receiver.
  • the intermediate device may at least partially communicate over the network on which the original communication request was placed.
  • the matched reputation data may be provided 208 to the source or the intended receiver.
  • the obtained reputation data may be provided to a smart phone for visual presentation 210 or as audible cue.
  • the reputation data may be forwarded through the intermediate device and then to the end communication device.
  • the communication request may be blocked 210 without displaying the reputation data.
  • the reputation data is displayed, but the communication link is not completed.
  • a log of blocked communication requests may be maintained.
  • the reputation data may be retained in a “blocked” log for user observation.
  • reputation data is presented if one or more criteria are met.
  • criteria include adult content, a verified charity, a scalar reputation value, classification, financial solicitation and so on. If, for instance, a call is “questionable” the procedure may include presenting a portion of the data as a warning, while a “bad” source is blocked without display. Pre-selected ring tones may be used to alert the user of a blocked call.
  • An adjustable threshold may be set to determine when blocking or display of reputation data is appropriate. For example, a heuristic user preference determination may be used to reset a “block” threshold level. Other learning techniques are available as well. For instance, a system implementing the present process may passively block communications unless overridden by the user.
  • the procedure may include accepting user feedback 212 .
  • User feedback may include providing reputation information, classification information and so on.
  • User feedback may be obtained through a communication device, accessed over the Internet and so on.
  • Feedback may be solicited at the end of a communication resulting from the communication request.
  • a user may be prompted to enter data via an input on the device, call a “toll-free” (or other) number or access a web page.
  • a user is asked to text feedback.
  • the procedure may include comparing 302 an end point with a database. For example, the telephone number from which a telephone call is placed is compared to reputation data associated with telephone numbers stored in the database.
  • an “address book” of acceptable communication end points may be maintained so comparing may be bypassed, if the end point matches an acceptable end point maintained in the address book.
  • the database may include reputation data associated with a communication end point.
  • the database may include reputation information and classification information for an identified end point. For instance, a call placed from (509) 555-1212 is compared to the database. If the telephone number is matched, the associated reputation (such as “suspicious”) and the classification (such as “financial solicitation”) maintained in the database are retrieved.
  • reputation data may include how the reputation was determined, an identity, a number of users associated with an identifier (such as a phone number), date stamps, communication history, reputation data to aid data analysis, evidence to support an assigned reputation, and so on.
  • a database record of reputation data may include the following information.
  • Comparing may be done in response to a communication request. For example, a database search is initiated in response to a source placing a telephone call or sending a text message. If a delay occurs in completing the communication link, a message may be presented to explain the delay. The message may function as an additional deterrent for unsolicited calls.
  • the database may be maintained by a third party. For example, a telephone company or a cellular telephone service provider. In other instances, service provider or organization may maintain the database.
  • the reputation data obtained 306 from the comparison may be forwarded to a service module for use 308 with learned blocking rules or user defined rules based on user selection.
  • the communication request may be blocked 308 based on a heuristic determination of user preferences. For instance, although additional reputation data is maintained in the database, only a portion of the maintained reputation data may be used in response to the search. For example, additional information is not retrieved based on user preferences, display capability or communication blocking profiles.
  • the obtained reputation data is implemented for display, presented as an audible cue, and so on.
  • the obtained reputation data may be forwarded to a user interface associated with the communication device. Presenting reputation data similarly may based on learned user preferences (such as a heuristic determination), or on user applied rules.
  • the procedure may include permitting 310 reputation feedback upon completion of a communication resulting from the communication request. For example, after a user has “viewed” a text message the user may be permitted to provide reputation feedback.
  • a user may be permitted or perhaps, reminded via an audible message that he/she can provide reputation feedback. For example, the user may be prompted to “delete” the voice mail message and concurrently provide reputation feedback (e.g., a message stating “press 7 to delete and report as a financial solicitation”).

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Strategic Management (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Telephonic Communication Services (AREA)

Abstract

Techniques are described which may provide information regarding the end point's reputation, for presentation, or selectively block communications according to user preferences. In an implementation, a request to establish a communication link may include searching a database of reputation data for information regarding at least one of the source's reputation data or the intended receiver's reputation data.

Description

    BACKGROUND
  • Telephony and text messaging is becoming increasingly widespread. In addition to fixed location communication systems, mobile communication devices allow users to remain in near continual communication throughout his/her daily life. Many devices, such as mobile telephone communication devices, may additionally permit textual communication, such as “text messaging” (TM) or “instant messaging” (IM), which may further ease user communication.
  • While increased communication connectivity is beneficial, unwanted interruptions may intrude on a user's daily life. For example, a user may wish to avoid certain types of communications such as, sales calls; text messages for goods or services; adult content; calls or messages which are of a dubious nature (i.e., known or suspected scams) or may result in a fee (a “900” number or a fee based IM). In other situations, a user may be hesitant to communicate with an unknown party.
  • Limited information exists to avoid unwanted communications or be aware of a communicant's status. A prime example of this problem is a telephone call which is received during dinnertime. Even if the user subscribes to “caller id,” which provides the user with the telephone number associated with the communication, this information may be of limited use in deciding whether to “pickup” or complete the call. Additionally, persons attempting to defraud a user may implement a variety of techniques to avoid revealing his/her identity. A party attempting to implement a telephone scam may use numerous telephone numbers and aliases to minimize detection.
  • As a result, a user may be hesitant to communicate with an inbound call or other communication because he/she is not sure if the other party is legitimate. For instance, a caller may ask to call back a credit card company, at the phone number provided on the credit card, rather than risk divulging information to a party establishing an inbound communication.
  • Outbound communications are also subject to similar problems. Some users may avoid contacting legitimate businesses/institutions in an attempt to avoid being defrauded. The foregoing situation may be exemplified by senior citizens and other portions of the population which are increasingly the targets of fraudulent communications. For instance, a 3rd party may attempt to establish a “phony” toll-free number to lure unsuspecting users into divulging financial or personal information which is subsequently used in a fraudulent manner. Other forms of communication, such as mail solicitation, television commercials, may be implemented in order to direct users to contact these phony numbers.
  • SUMMARY
  • Techniques are described which may provide information regarding the end point's reputation, for presentation, or selectively block communications according to user preferences. In an implementation, a request to establish a communication link may include searching a database of reputation data for information regarding at least one of the source's or the intended receiver's reputation data.
  • This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The detailed description is described with reference to the accompanying figures. In the figures, the left-most digit(s) of a reference number identifies the figure in which the reference number first appears. The use of the same reference numbers in different instances in the description and the figures may indicate similar or identical items.
  • FIG. 1 illustrates an environment in an exemplary implementation that may use technologies to provide communication reputation data.
  • FIG. 2 is a flow diagram depicting a procedure in an exemplary implementation in which reputation data is provided to a source or an intended receiver.
  • FIG. 3 is a flow diagram depicting a procedure in an exemplary implementation in which reputation data is implemented to block communication or present reputation data.
  • DETAILED DESCRIPTION
  • Overview
  • Accordingly, techniques are described to provide reputation data to a communication end point to prevent communication, present reputation information, and so on. For example, prior to a phone call being completed, an end point is presented with reputation data associated with the source of the call. In the present discussion, a communication end point may be a communication source or a communication intended receiver/receiver. The techniques described herein may be applicable to inbound and outbound directed communications. While telephonic (voice “land line”) communication is primarily discussed, the techniques, software/hardware and system are additionally applicable to mobile telephone communication (including cellular telephone communication), instant messaging, text messaging, voice messaging, and facsimile communication. Examples of telephone communication may include land lines, cellular communications, as well as, voice over internet protocol communications (VoIP).
  • In an implementations, techniques are described in which reputation data is provided to a source and/or an intended receiver as part of a request to complete a communication link. A database is searched to obtain reputation data associated with one of the end points to the intended communication. For example, at least a portion of a caller's reputation may be presented to the intended recipient as a visual display or audible cue, so that the recipient may better understand the caller's (end point) reputation.
  • In the following discussion, exemplary environments are first described that are operable to provide communication end point reputation to another communication endpoint. For example, the reputation of a call's source is provided to an intended receiver. For outbound communications, a communication source may be provided with reputation data associated with the intended receiver. For example, an audible message may be presented to warn the caller that the intended recipient has a “suspicious” reputation. The provided communication end point reputation may be used to block a requested communication, or may be presented to another end point, and so on.
  • Exemplary Environment
  • FIG. 1 illustrates an environment 100 in an exemplary implementation that is operable to employ a reputation classification system 102. An assignment module 106 may be included in the reputation classification system 102. As illustrated, the reputation classification system 102 is resident on a computing device 104 which is remote from the communication request. The assignment module 106 may accept user feedback information and usage information to generate reputation data associated with a communication end point.
  • The assignment module 106 may be configured to collect data and assign reputation and classification to a communication end point. For instance, after a predetermined number of short duration phone calls and reports from clients, indicating the conversation was “financial” in nature and “suspicious,” the assignment module 106 assigns the communication source a “solicitor” classification. This assignment may be based on usage, reported reputation or a combination thereof. The source also may be assigned a “suspicious” reputation.
  • Assigned reputation data, including the end point classification, may be stored in a database 108. The assignment module 106 may forward additional reputation data to the database 108 for storage. For example, the assignment module 106 may send reputation data regarding how the classification and reputation determination was made. Examples may include an agency reporting the end point, a “large” group of users (in comparison to other end point reputation data stored in the database 108) reporting similar reputation information and classification information, a “small” group (in comparison to other reputation data stored in the database 108) reporting an “egregious” reputation information and an “offensive” classification information, and so on. The database may be arranged in a hierarchical configuration to promote efficient searching. For example, a database for telephone communication end points may be arranged according to “area code” and “prefix.”
  • Other reputation data may include date stamps, an identity (such as a phone number), how many users are associated with an identifier (such as a telephone number), communication history, reputation data to aid data analysis, evidence to support an assigned reputation, and so on. The assignment module 106 may integrate user feedback information and usage information to maintain reputation data for the communication request source or intended receiver/receiver.
  • In specific implementations, reputation data includes a scaled value for a reputation and a classification. A reputation scale may range from “good” or “trustworthy” to “suspicious” to “bad.” Correspondingly, the different reputation descriptors may be associated with numerical ranges. For instance, a “bad” input may be assigned a higher scale value than a “suspicious” ranking. Implementing a scale may permit weighting feedback and other analysis. For example, “bad” reputation feedback may be weighted more than a “good” reputation feedback. Classifications may include, but are not limited to, solicitations, pay services, adult content, and so on. Multiple classifications may be applied. For example, an adult end point having a fee component, may be assigned an “adult” and a “fee service” classification. The classifications may be scaled as well.
  • Different reputations and classifications schemes may be utilized for end points associated with minors. For example, the assignment module 106 may assign additional or different factors as part of the reputation data for use with an end point associated with a minor. The reputation classification system 102 as described herein may permit “parental control” thorough use of assigned reputation data.
  • The assignment module 106 may obtain feedback information from an interface module 110 associated with a communication end point. For example, at the end of a telephone conversation, the receiver may input reputation feedback information associated with the source of the call. For instance, a user may input data via a web page using a check box, an adjustable indicator, and so on.
  • In possible implementations, the interface module 110 is accessed as a web page on which the user may input data associated with the communication. For example, a user may interact with the interface module 110 to classify a communication requesting a donation as a “financial solicitation.” Further, the user may assign a “suspicious” reputation to the source end point.
  • In other implementations, the interface module 10 is included in a communication device. For example, a user may navigate a screen included on a land line phone 114 to input reputation data. For text messages, a user may submit a text message, to the interface module 110, regarding the reputation of the party sending an original text message. For devices with limited functionality (for data to be entered), the interface module 110 may accommodate telephone inputs. For instance, a user may call an established toll free number to input reputation data.
  • The interface module 110 may request a password to access data, report a reputation or access other features. This may permit a parent to exercise control over a common communication device or tailor a communication device specifically for a minor.
  • The reputation classification system 102 may include a service module 116. The service module 116 may forward usage information to the assignment module 106. For example, a usage pattern is forwarded to the assignment module 106 for incorporation into reputation data. Thus, the service module 116 may identify an end, point making numerous short duration phone calls, to the assignment module 106. Usage information may include, but is not limited to, identifying an end point which routinely communicates with particular segments of the population. For example, social engineering “campaigns” may contact numerous devices associated with users belonging to a particular group. Common targets may include senior citizens, people who contributed to organizations, people residing in particular areas, and so on.
  • In additional implementations, reputation data may be integrated from other communication formats. Thus, reputation data derived from other communications mediums may be incorporated into reputation data for the relevant medium. For example, a user may report a telephone number associated with a physical mail solicitation to the interface module 110 for consideration in determining a telephone reputation. In other instances, the service module 116 may block a telephone communication from a telephone number associated with an email “SPAM” campaign. In contrast, a communication end point which is related to a well characterized communication end point (such as a highly trafficked corporate web site) in another communication format may be assigned a reputation and classification based at least partially on the reputation data characteristics for the other communication medium. For example, a telephone number associated with a highly trafficked corporate or government web site is assigned a “verified” telephone reputation based on the communication characteristics associated with the Web traffic.
  • In further implementations, the service module 116 blocks or presents reputation data based on learned user preferences. The service module 116 may block the communication if one or more criteria are met. Criteria may include a portion of the reputation data stored in the database 108. For example, the service module 116 may block communications from an end point having with a “fee” classification. Blocking may be achieved by the communication device querying the service module 116 via a simple object access protocol (SOAP). For example, the communication device may access the service module 116 by a SOAP request.
  • The service module 116 may allow passive blocking of communication requests based on learned user preferences. For example, the service module 116 may block communications having reputation characteristic(s) similar to those the user has previously blocked, reported unfavorable reputation data, ended the communication quickly, and so on. The service module 116 may apply a heuristic determination of previous user inputs and usage to determine whether to permit the call or present reputation data.
  • If, for example, a communication is from a “questionable” end point, the service module 116 provides at least a portion of the reputation data based on the assigned reputation, if a user has previously requested reputation data for “questionable” end points. The service module 116 may block a communication from a “bad” end point, if the user has previously blocked calls from other “bad” end points. For outbound communications the service module 116 may present an audible warning of the end point's reputation data. The service module 116 may adaptively learn which communication requests to block, or present data for, as a result of user preference changes. For example, if a user repeatedly blocks a “questionable” end point the service module 116 may block similar end points. Further, if a user has several outbound communications with “questionable” end points the service module 116 may raise the threshold for incoming calls. The user may configure the interface module 110 to override the service module 116 as desired.
  • In other instances, the user may override the passive blocking by applying user selected rules. A user may turn off passive blocking, rather than risk blocking a desired communication. Further, the user may interact with the service module 116 by adjusting the level at which passive blocking is applied. The user may do this by accessing the service module 116 through the interface module 110.
  • In her implementations, the service module 116 may include an address book of acceptable communication end points. Alternatively, the address book may be maintained in the database 108 as well. In this manner, the service module 116 may search the address book prior to searching reputation data. For example, the service module may include a list of acceptable communication sources, for the intended receiver, so that a communication from a family member is passed through without searching for the source's reputation.
  • Depending on the reputation classification system 102 configuration, the system components and the communication devices may communicate via a network 118 or multiple networks. For example, the network 118 is the “Internet,” or the “World Wide Web,” while the communication request and subsequent communication occur over a separate land line network. In the case of a Voice over Internet Protocol telephone communication (VoIP), the Internet may be utilized for both the voice communication and communications for the reputation classification system components. In the case of a text messaging system, a cell phone or a smart phone 120, a cellular network may be included. For example, communication requests may be passed over a wireless cellular link, while communications between the smart phone and the reputation classification system 102 occur over the cellular network and the Internet.
  • While the Internet is referenced throughout the previous discussion, other networks are suitable as well. For example, the network may include a wide area network (WAN), a local area network (LAN), a wireless network, a public telephone network, an intranet, and so on. Although a network is shown, the network may be configured to include multiple sub-networks or multiple different networks.
  • In further cases, a reputation classification system may be partially maintained on a device functioning as a communication end point. For example, the user module and the interface module 110 may be included on a smart phone to interact with a database 108 maintained by a computing device 104.
  • Other configurations are contemplated as well. For example, the interface module 122 may reside on an end point device (such as the smart phone 120), while the assignment module 124 and the service module 126 and database 128 reside on private branch exchange hardware 130.
  • Generally, any of the functions described herein can be implemented using software, firmware, hardware (e.g., fixed logic circuitry), manual processing, or a combination of these implementations. The terms “module,” “functionality,” and “logic” as used herein generally represent software, firmware, hardware, or a combination thereof. In the case of a software implementation, for instance, the module, functionality, or logic represents program code that performs specified tasks when executed on a processor (e.g., CPU or CPUs). The program code can be stored in one or more computer readable memory devices, e.g., memory.
  • The following discussion describes transformation techniques that may be implemented utilizing the previously described systems and devices. Aspects of each of the procedures may be implemented in hardware, firmware, or software, or a combination thereof. The procedures are shown as a set of blocks that specify operations performed by one or more devices and are not necessarily limited to the orders shown for performing the operations by the respective blocks.
  • Exemplary Procedures
  • The following discussion describes a methodology that may be implemented utilizing the previously described systems and devices. Aspects of each of the procedures may be implemented in hardware, firmware, or software, or a combination thereof. The procedures are shown as a set of blocks that specify operations performed by one or more devices and are not necessarily limited to the orders shown for performing the operations by the respective blocks. A variety of other examples are also contemplated.
  • FIG. 2 discloses an exemplary procedure of reputation communication filtering. The procedure may include requesting 202 establishment of a communication link between a source and an intended receiver/receiver. Examples of communication link requests include placing a telephone call or facsimile by dialing a telephone number, transmitting a text message, and so on. The communication link request may be issued over a dedicated network. For instance, an incoming communication request may be issued over a land line network.
  • A database including reputation data may be searched 204 for reputation data associated with the source of the communication, the intended receiver or combinations thereof. The procedure may include searching a database of reputation data associated with a physical device used in the communication request. Reputation data may include at least a reputation and a classification for a source, an intended receiver/receiver. A list or address book of acceptable communication sources/intended receiver may be checked 206 so that the communication link is connected without having to search for reputation data. For example, the procedure may include searching the user's “acceptable” address book prior to searching for reputation data. If an end point is included in the address book the communication may be permitted without searching the database. Thus, database searching may be avoided for communication end points occurring in the address book. Personalized information associated with the communication end point in the address book may be provided.
  • Searching may be initiated by forwarding the search request from the communication device to a remote server. For example, a facsimile machine forwards a search request to a remote computer prior to connecting the facsimile call. In this case, the fax may implement a SOAP communication with a remote server which searches the database. This search request may be made over a separate network than the network on which the communication request was received.
  • In further examples, the communication request is intercepted by intermediate device which requests a search prior to completing the communication link with the intended device. For example, a PBX exchange device searches a database including reputation data before the call is completed to the intended receiver. In this instance, as well as others, the intermediate device may at least partially communicate over the network on which the original communication request was placed.
  • If a match is obtained, the matched reputation data may be provided 208 to the source or the intended receiver. For example, the obtained reputation data may be provided to a smart phone for visual presentation 210 or as audible cue. In the case of an intermediate device, the reputation data may be forwarded through the intermediate device and then to the end communication device.
  • If the obtained reputation data meets a “block” criteria, the communication request may be blocked 210 without displaying the reputation data. In other instances, the reputation data is displayed, but the communication link is not completed. A log of blocked communication requests may be maintained. For example, the reputation data may be retained in a “blocked” log for user observation.
  • In other instances, reputation data is presented if one or more criteria are met. Exemplary criteria include adult content, a verified charity, a scalar reputation value, classification, financial solicitation and so on. If, for instance, a call is “questionable” the procedure may include presenting a portion of the data as a warning, while a “bad” source is blocked without display. Pre-selected ring tones may be used to alert the user of a blocked call.
  • An adjustable threshold may be set to determine when blocking or display of reputation data is appropriate. For example, a heuristic user preference determination may be used to reset a “block” threshold level. Other learning techniques are available as well. For instance, a system implementing the present process may passively block communications unless overridden by the user.
  • The procedure may include accepting user feedback 212. User feedback may include providing reputation information, classification information and so on. User feedback may be obtained through a communication device, accessed over the Internet and so on.
  • Feedback may be solicited at the end of a communication resulting from the communication request. For a land line phone, a user may be prompted to enter data via an input on the device, call a “toll-free” (or other) number or access a web page. In another example, a user is asked to text feedback.
  • Referring to FIG. 3, a procedure and computer readable-media including computer-executable instructions that may direct a computer to perform the disclosed procedure are discussed. The procedure may include comparing 302 an end point with a database. For example, the telephone number from which a telephone call is placed is compared to reputation data associated with telephone numbers stored in the database. Optionally, an “address book” of acceptable communication end points may be maintained so comparing may be bypassed, if the end point matches an acceptable end point maintained in the address book.
  • The database may include reputation data associated with a communication end point. For instance, the database may include reputation information and classification information for an identified end point. For instance, a call placed from (509) 555-1212 is compared to the database. If the telephone number is matched, the associated reputation (such as “suspicious”) and the classification (such as “financial solicitation”) maintained in the database are retrieved.
  • Other information may be included in the reputation data. Other reputation data may include how the reputation was determined, an identity, a number of users associated with an identifier (such as a phone number), date stamps, communication history, reputation data to aid data analysis, evidence to support an assigned reputation, and so on. For example, a database record of reputation data may include the following information.
  • TABLE 1
    Database Record
    Area Code Prefix Number Reputation Classification Reported Misc.
    509 555 1212 questionable solicitation individuals calls at dinner time
  • Comparing may be done in response to a communication request. For example, a database search is initiated in response to a source placing a telephone call or sending a text message. If a delay occurs in completing the communication link, a message may be presented to explain the delay. The message may function as an additional deterrent for unsolicited calls. The database may be maintained by a third party. For example, a telephone company or a cellular telephone service provider. In other instances, service provider or organization may maintain the database.
  • The reputation data obtained 306 from the comparison, may be forwarded to a service module for use 308 with learned blocking rules or user defined rules based on user selection. The communication request may be blocked 308 based on a heuristic determination of user preferences. For instance, although additional reputation data is maintained in the database, only a portion of the maintained reputation data may be used in response to the search. For example, additional information is not retrieved based on user preferences, display capability or communication blocking profiles.
  • In other instances, the obtained reputation data is implemented for display, presented as an audible cue, and so on. The obtained reputation data may be forwarded to a user interface associated with the communication device. Presenting reputation data similarly may based on learned user preferences (such as a heuristic determination), or on user applied rules.
  • Additionally, the procedure may include permitting 310 reputation feedback upon completion of a communication resulting from the communication request. For example, after a user has “viewed” a text message the user may be permitted to provide reputation feedback. In the case of a telephone call in which a source “leaves” a voice mail message a user may be permitted or perhaps, reminded via an audible message that he/she can provide reputation feedback. For example, the user may be prompted to “delete” the voice mail message and concurrently provide reputation feedback (e.g., a message stating “press 7 to delete and report as a financial solicitation”).
  • CONCLUSION
  • Although the invention has been described in language specific to structural features and/or methodological acts, it is to be understood that the invention defined in the appended claims is not necessarily limited to the specific features or acts described. Rather, the specific features and acts are disclosed as exemplary forms of implementing the claimed invention.

Claims (20)

1. A method comprising:
requesting establishment of a communication link between a source and an intended receiver;
searching a database, including reputation data, for reputation data associated with at least one of the source or the intended receiver; and
providing reputation data derived from the database search to at least one of the source or the intended receiver.
2. A method as described in claim 1, wherein the communication link is selected from the group consisting of a telephone voice link, a text message link, facsimile link, and an instant message link.
3. A method as described in claim 1, further comprising blocking the request to establish a communication link, if upon searching the database, a criteria is met.
4. A method as described in claim 3, wherein the criteria is a user adjustable threshold.
5. A method as described in claim 1, further comprising blocking the request to establish a communication link based on a heuristic determination of user reputation preferences.
6. A method as described in claim 1, wherein providing reputation data includes presenting a visual cue of a portion of the reputation data.
7. A method as described in claim 1, further comprising soliciting reputation feedback at the end of a communication resulting from the communication request.
8. A method as described in claim 7, further comprising accepting user feedback at the end of a communication resulting from the communication request.
9. A method as described in claim 1, wherein reputation data includes at least one of adult content, fee service, suspected fraud, verified financial service, usage, verified charity, scalar reputation value, classification, or financial solicitation.
10. One or more computer-readable media comprising computer-executable instructions that, when executed, direct a computing system to,
in response to a communication request, compare an end point with a database storing reputation data;
obtain reputation data for the end point; and
based on user selection, utilize the obtained reputation data to at least one of block the communication request or present at least a portion of the reputation data to a user.
11. The one or more computer-readable media as described in claim 10, wherein reputation data is scaled.
12. The one or more computer-readable media as described in claim 10, wherein the database is maintained by a third party to the communication request.
13. The one or more computer-readable media as described in claim 10, further comprising permit reputation feedback upon termination of a communication resulting from the communication request.
14. The one or more computer-readable media as described in claim 13, wherein reputation feedback is provided to a web page.
15. The one or more computer-readable media as described in claim 10, wherein reputation data is presented audibly.
16. A system comprising:
an assignment module to assign a reputation to a communication end point;
a service module to passively block a communication request or provide reputation data based on the assigned reputation; and
an interface module to interface with the service module to apply user selected rules to the service module.
17. The system of claim 16, wherein the service module forwards usage data to the assignment module.
18. The system of claim 16, wherein the interface module solicits user feedback at the end of a communication resulting from the communication request.
19. The system of claim 16, wherein the communication request is selected from the group consisting of a telephone voice request, a text message request, facsimile request, and an instant message request.
20. The system of claim 16, wherein reputation data is presented at least one of audibly or visually.
US11/692,865 2007-03-28 2007-03-28 Communication reputation Expired - Fee Related US7895154B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/692,865 US7895154B2 (en) 2007-03-28 2007-03-28 Communication reputation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US11/692,865 US7895154B2 (en) 2007-03-28 2007-03-28 Communication reputation

Publications (2)

Publication Number Publication Date
US20080243920A1 true US20080243920A1 (en) 2008-10-02
US7895154B2 US7895154B2 (en) 2011-02-22

Family

ID=39796136

Family Applications (1)

Application Number Title Priority Date Filing Date
US11/692,865 Expired - Fee Related US7895154B2 (en) 2007-03-28 2007-03-28 Communication reputation

Country Status (1)

Country Link
US (1) US7895154B2 (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080303689A1 (en) * 2007-06-07 2008-12-11 Microsoft Corporation Accessible Content Reputation Lookup
US20090132689A1 (en) * 2007-11-15 2009-05-21 Yahoo! Inc. Trust based moderation
US20100114744A1 (en) * 2008-10-30 2010-05-06 Metro Enterprises, Inc. Reputation scoring and reporting system
US20110283349A1 (en) * 2009-03-12 2011-11-17 Zte Corporation Implement method and device of terminal call firewall
US20120159580A1 (en) * 2010-11-24 2012-06-21 Galwas Paul Anthony Method of Establishing Trusted Contacts With Access Rights In a Secure Communication System
US8484730B1 (en) * 2011-03-10 2013-07-09 Symantec Corporation Systems and methods for reporting online behavior
US8849909B2 (en) 2007-07-06 2014-09-30 Yahoo! Inc. Real-time asynchronous event aggregation systems
US8862699B2 (en) 2009-12-14 2014-10-14 Microsoft Corporation Reputation based redirection service
US9167081B1 (en) 2014-05-09 2015-10-20 Lexisnexis Risk Solutions Inc. Systems and methods for scoring phone numbers
US9336379B2 (en) 2010-08-19 2016-05-10 Microsoft Technology Licensing, Llc Reputation-based safe access user experience
US9519682B1 (en) 2011-05-26 2016-12-13 Yahoo! Inc. User trustworthiness
CN107113360A (en) * 2014-12-23 2017-08-29 英特尔公司 Cooperate phone credit system
US20200177552A1 (en) * 2011-02-15 2020-06-04 Webroot Inc. Methods and apparatus for malware threat research
US11627145B2 (en) * 2014-09-24 2023-04-11 Mcafee, Llc Determining a reputation of data using a data visa including information indicating a reputation

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8750842B1 (en) 2012-03-01 2014-06-10 Amdocs Software Systems Limited System, method, and computer program for filtering a request to communicate with a user
US9729616B2 (en) * 2014-07-18 2017-08-08 Cisco Technology, Inc. Reputation-based strategy for forwarding and responding to interests over a content centric network

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5379307A (en) * 1991-07-05 1995-01-03 Fujitsu Limited System for detecting failure in dual bus user network
US6198812B1 (en) * 1998-09-23 2001-03-06 Effectrol Patent Trust Incoming telephone call filter utilizing a duplicitous caller-ID recognition method and apparatus
US6353663B1 (en) * 1999-12-06 2002-03-05 Alcatel Usa Sourcing, Lp Method and apparatus for screening telephone calls
US20030072426A1 (en) * 2001-09-26 2003-04-17 Richard Davidson Method for processing potentially unwanted calls
US6748422B2 (en) * 2000-10-19 2004-06-08 Ebay Inc. System and method to control sending of unsolicited communications relating to a plurality of listings in a network-based commerce facility
US6925162B1 (en) * 1999-09-16 2005-08-02 Mci, Inc. Method and system for negotiated call forwarding
US20050201363A1 (en) * 2004-02-25 2005-09-15 Rod Gilchrist Method and apparatus for controlling unsolicited messaging in real time messaging networks
US20050227678A1 (en) * 2004-04-09 2005-10-13 Anuraag Agrawal Spam control for sharing content on mobile devices
US20060015937A1 (en) * 2004-06-08 2006-01-19 Daniel Illowsky System method and model for maintaining device integrity and security among intermittently connected interoperating devices
US7068761B2 (en) * 1999-03-02 2006-06-27 Sbc Properties, L.P. Method and system for canceling unwanted telephone calls
US20060173741A1 (en) * 2004-12-10 2006-08-03 Marshal James C Permission-based marketing method and system
US7127050B2 (en) * 2000-03-27 2006-10-24 Sbc Propoerties, L.P. Method and system for providing enhanced caller identification information
US7136472B2 (en) * 1999-08-12 2006-11-14 Bellsouth Intellectual Property Corporation System and method for privacy management
US20060293057A1 (en) * 2005-06-24 2006-12-28 Mazerski Thomas M System and method for secure web-based mobile phone parental controls
US7562304B2 (en) * 2005-05-03 2009-07-14 Mcafee, Inc. Indicating website reputations during website manipulation of user information

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5379307A (en) * 1991-07-05 1995-01-03 Fujitsu Limited System for detecting failure in dual bus user network
US6198812B1 (en) * 1998-09-23 2001-03-06 Effectrol Patent Trust Incoming telephone call filter utilizing a duplicitous caller-ID recognition method and apparatus
US7068761B2 (en) * 1999-03-02 2006-06-27 Sbc Properties, L.P. Method and system for canceling unwanted telephone calls
US20060233320A1 (en) * 1999-03-02 2006-10-19 Latter Teresa F Method and system for canceling unwanted calls
US7136472B2 (en) * 1999-08-12 2006-11-14 Bellsouth Intellectual Property Corporation System and method for privacy management
US6925162B1 (en) * 1999-09-16 2005-08-02 Mci, Inc. Method and system for negotiated call forwarding
US6353663B1 (en) * 1999-12-06 2002-03-05 Alcatel Usa Sourcing, Lp Method and apparatus for screening telephone calls
US7127050B2 (en) * 2000-03-27 2006-10-24 Sbc Propoerties, L.P. Method and system for providing enhanced caller identification information
US6748422B2 (en) * 2000-10-19 2004-06-08 Ebay Inc. System and method to control sending of unsolicited communications relating to a plurality of listings in a network-based commerce facility
US20030072426A1 (en) * 2001-09-26 2003-04-17 Richard Davidson Method for processing potentially unwanted calls
US20050201363A1 (en) * 2004-02-25 2005-09-15 Rod Gilchrist Method and apparatus for controlling unsolicited messaging in real time messaging networks
US20050227678A1 (en) * 2004-04-09 2005-10-13 Anuraag Agrawal Spam control for sharing content on mobile devices
US20060015937A1 (en) * 2004-06-08 2006-01-19 Daniel Illowsky System method and model for maintaining device integrity and security among intermittently connected interoperating devices
US20060173741A1 (en) * 2004-12-10 2006-08-03 Marshal James C Permission-based marketing method and system
US7562304B2 (en) * 2005-05-03 2009-07-14 Mcafee, Inc. Indicating website reputations during website manipulation of user information
US20060293057A1 (en) * 2005-06-24 2006-12-28 Mazerski Thomas M System and method for secure web-based mobile phone parental controls

Cited By (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7966553B2 (en) * 2007-06-07 2011-06-21 Microsoft Corporation Accessible content reputation lookup
US20110167328A1 (en) * 2007-06-07 2011-07-07 Microsoft Corporation Accessible content reputation lookup
US20080303689A1 (en) * 2007-06-07 2008-12-11 Microsoft Corporation Accessible Content Reputation Lookup
US9769194B2 (en) 2007-06-07 2017-09-19 Microsoft Technology Licensing, Llc Accessible content reputation lookup
US8849909B2 (en) 2007-07-06 2014-09-30 Yahoo! Inc. Real-time asynchronous event aggregation systems
US9576253B2 (en) 2007-11-15 2017-02-21 Yahoo! Inc. Trust based moderation
US20090132689A1 (en) * 2007-11-15 2009-05-21 Yahoo! Inc. Trust based moderation
US8171388B2 (en) * 2007-11-15 2012-05-01 Yahoo! Inc. Trust based moderation
US20100114744A1 (en) * 2008-10-30 2010-05-06 Metro Enterprises, Inc. Reputation scoring and reporting system
US8117106B2 (en) * 2008-10-30 2012-02-14 Telesign Corporation Reputation scoring and reporting system
US20110283349A1 (en) * 2009-03-12 2011-11-17 Zte Corporation Implement method and device of terminal call firewall
US8549608B2 (en) * 2009-03-12 2013-10-01 Zte Corporation Implement method and device of terminal call firewall
US8862699B2 (en) 2009-12-14 2014-10-14 Microsoft Corporation Reputation based redirection service
US9336379B2 (en) 2010-08-19 2016-05-10 Microsoft Technology Licensing, Llc Reputation-based safe access user experience
US20120159580A1 (en) * 2010-11-24 2012-06-21 Galwas Paul Anthony Method of Establishing Trusted Contacts With Access Rights In a Secure Communication System
US20200177552A1 (en) * 2011-02-15 2020-06-04 Webroot Inc. Methods and apparatus for malware threat research
US8484730B1 (en) * 2011-03-10 2013-07-09 Symantec Corporation Systems and methods for reporting online behavior
US9519682B1 (en) 2011-05-26 2016-12-13 Yahoo! Inc. User trustworthiness
US9380154B2 (en) 2014-05-09 2016-06-28 Lexisnexis Risk Solutions Inc. Systems and methods for scoring phone numbers
GB2540692A (en) * 2014-05-09 2017-01-25 Lexisnexis Risk Solutions Inc Systems and methods for scoring phone numbers
US9591130B2 (en) 2014-05-09 2017-03-07 Lexisnexis Risk Solutions Inc. Systems and methods for scoring phone numbers
WO2015171204A1 (en) * 2014-05-09 2015-11-12 Lexisnexis Risk Solutions Inc. Systems and methods for scoring phone numbers
US9167081B1 (en) 2014-05-09 2015-10-20 Lexisnexis Risk Solutions Inc. Systems and methods for scoring phone numbers
US11627145B2 (en) * 2014-09-24 2023-04-11 Mcafee, Llc Determining a reputation of data using a data visa including information indicating a reputation
US10044855B2 (en) 2014-12-23 2018-08-07 Intel Corporation Collaborative phone reputation system
JP2018038066A (en) * 2014-12-23 2018-03-08 インテル コーポレイション Collaborative phone reputation system
CN108696644A (en) * 2014-12-23 2018-10-23 英特尔公司 Cooperate phone credit system
EP3291524A1 (en) * 2014-12-23 2018-03-07 Intel Corporation Collaborative phone reputation system
US10715659B2 (en) 2014-12-23 2020-07-14 Intel Corporation Collaborative phone reputation system
US11032417B2 (en) 2014-12-23 2021-06-08 Intel Corporation Collaborative phone reputation system
CN107113360A (en) * 2014-12-23 2017-08-29 英特尔公司 Cooperate phone credit system
US11838443B2 (en) 2014-12-23 2023-12-05 Intel Corporation Collaborative phone reputation system

Also Published As

Publication number Publication date
US7895154B2 (en) 2011-02-22

Similar Documents

Publication Publication Date Title
US7895154B2 (en) Communication reputation
US11316973B2 (en) Methods and systems for inbound and outbound call control
US9819797B2 (en) Methods and systems for inbound call control
US7487170B2 (en) Location information for avoiding unwanted communications systems and methods
US7697942B2 (en) Location based rules architecture systems and methods
US8935226B2 (en) Location based access to financial information systems and methods
US9002814B2 (en) Location based authorization of financial card transactions systems and methods
US8443049B1 (en) Call processing using trust scores based on messaging patterns of message source
US8510319B2 (en) Location based information for emergency services systems and methods
JP5351787B2 (en) Communication processing system and program
EP2328334A1 (en) Method and systems for real time display of caller location, profile, and trust relationship
JP2013005205A (en) Ill-motivated telephone call prevention device and ill-motivated telephone call prevention system
US10230837B2 (en) Methods and systems for inbound and outbound call control
US7130405B2 (en) Identifying a call made or received on behalf of another
US9002333B1 (en) Mobile device reputation system
JP2005109610A (en) Method and system for preventing nuisance call
US20090178117A1 (en) System and method of retrieving a service contact identifier
JP6296159B2 (en) Caller identification device, caller identification method, and recording medium for storing caller identification program
US11627218B2 (en) Caller identification information analyzer
CN106888229B (en) Call management method and server
US7409206B2 (en) Defending against unwanted communications by striking back against the beneficiaries of the unwanted communications
JP6368666B2 (en) Nuisance call countermeasure system and nuisance call countermeasure method
KR20090096111A (en) Method and apparatus for processing spam
KR20180006775A (en) Apparatus for providing caller information and user device
CN103200178A (en) Method and device for inquiring and processing conversation party information

Legal Events

Date Code Title Description
AS Assignment

Owner name: MICROSOFT CORPORATION, WASHINGTON

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:NEWMAN, BEN;DE OLIVEIRA, JOSE M;REEL/FRAME:019130/0443

Effective date: 20070327

FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCF Information on status: patent grant

Free format text: PATENTED CASE

FPAY Fee payment

Year of fee payment: 4

AS Assignment

Owner name: MICROSOFT TECHNOLOGY LICENSING, LLC, WASHINGTON

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MICROSOFT CORPORATION;REEL/FRAME:034542/0001

Effective date: 20141014

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552)

Year of fee payment: 8

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

LAPS Lapse for failure to pay maintenance fees

Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20230222